Abstract is missing.
- Synthesis from LTL with Reward Optimization in Sampled Oblivious EnvironmentsJean-François Raskin, Yun-Chen Tsai. 3-21 [doi]
- An Assertion-Based Logic for Local Reasoning about Probabilistic ProgramsHuiling Wu, Anran Cui, Yuxin Deng. 25-45 [doi]
- Extending Symbolic Heap to Support Shared OwnershipJiyang Wu, Qinxiang Cao. 46-63 [doi]
- Constraint Based Invariant Generation with Modular OperationsYuchen Li, Hongfei Fu 0001, Haowen Long, Guoqiang Li 0001. 64-84 [doi]
- Data-Dependent WAR Analysis for Efficient Task-Based Intermittent ComputingJuxin Niu, Yunlong Yu, Wei Zhang, Nan Guan. 85-101 [doi]
- Can Language Models Pretend Solvers? Logic Code Simulation with LLMsMinyu Chen, Guoqiang Li 0001, Ling-I Wu, Ruibang Liu, Yuxin Su 0005, Xi Chang, Jianxin Xue. 102-121 [doi]
- Enhancing Multi-modal Regular Expression Synthesis via Large Language Models and Semantic Manipulations of Sub-expressionsZipan Tang, Yixuan Yan, Rongchen Li, Hanze Dong, Haiming Chen, Hongyu Gao. 122-141 [doi]
- Formal Verification of RISC-V Processor Chisel DesignsShidong Shen, Yicheng Liu, Lijun Zhang 0001, Fu Song, Zhilin Wu. 142-160 [doi]
- The Principle of Staking: Formal Verification of Staking Smart ContractZhongyun Zhang, Kundu Chen, Weiqi Guo, Wenbo Zhang 0004. 161-179 [doi]
- A Contract-Based Framework for Formal Verification of Embedded SoftwareXu Lu 0003, Cong Tian, Bin Gu 0006, Bin Yu 0008, Chen Chen, Zhenhua Duan. 180-196 [doi]
- Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics for eBPF JIT CorrectnessJiayi Lu, Shenghao Yuan, David Sanán, Yongwang Zhao. 197-216 [doi]
- The Design of Intelligent Temperature Control System of Smart House with MARSYihao Yin, Hao Wu, Shuling Wang, Xiong Xu, Fanjiang Xu, Naijun Zhan. 217-235 [doi]
- Universal Construction for Linearizable but Not Strongly Linearizable Concurrent ObjectsChao Wang 0069, Peng Wu 0002, Gustavo Petri, Qiaowen Jia, Youlin He, Yi Lv, Zhiming Liu 0001. 236-255 [doi]
- Cache Behavior Analysis with SP-Relative Addressing for WCET EstimationShangshang Xiao, Mengxia Sun, Wei Zhang, Naijun Zhan, Lei Ju. 256-274 [doi]
- Timing Analysis of Cause-Effect Chains for External Events with Finite Validity IntervalsXiantong Luo, Haochun Liang, Yue Tang 0001, Xu Jiang 0004, Nan Guan, Wang Yi 0001. 275-292 [doi]
- Runtime Verification of Neural-Symbolic SystemsShaojun Deng, Wanwei Liu, Miaomiao Zhang. 293-309 [doi]
- Eidos: Efficient, Imperceptible Adversarial 3D Point CloudsHanwei Zhang, Luo Cheng, Qisong He, Wei Huang 0035, Renjue Li, Ronan Sicre, Xiaowei Huang 0001, Holger Hermanns, Lijun Zhang 0001. 310-326 [doi]
- MILE: A Mutation Testing Framework of In-Context Learning SystemsZeming Wei, Yihao Zhang, Meng Sun. 327-343 [doi]
- A Derivative-Based Membership Algorithm for Enhanced Regular ExpressionsMengxi Wang, Chunmei Dong, Weihao Su, Chengyao Peng, Haiming Chen. 344-362 [doi]
- NanoHook: An Efficient System Call Hooking Technique with One-Byte InvasiveQuan Hong, Jiaqi Li, Wen Zhang, Lidong Zhai. 363-381 [doi]
- Faster Lifetime-Optimal Speculative Partial Redundancy Elimination for Goto-Free ProgramsXuran Cai, Amir Goharshady. 382-398 [doi]
- EDSLog: Efficient Log Anomaly Detection Method Based on Dataset PartitioningFeng Liang, Jing Liu 0003. 399-415 [doi]